Tor

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.

In order to use the WikiLeaks public submission system as detailed above you can download the Tor Browser Bundle, which is a Firefox-like browser available for Windows, Mac OS X and GNU/Linux and pre-configured to connect using the anonymising system Tor.

Tails

If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Tails will require you to have either a USB stick or a DVD at least 4GB big and a laptop or desktop computer.

Tips

Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Please review these basic guidelines.

1. Contact us if you have specific problems

If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations.

2. What computer to use

If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer.

3. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

After

1. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

3. Remove traces of your submission

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

4. If you face legal action

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives.

The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. (See our Tor tab for more information.) We also advise you to read our tips for sources before submitting.

wlupld3ptjvsgwqw.onion

Copy this address into your Tor browser. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key.

If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed.

1. (U) The following Security Environment Profile
Questionnaire (SEPQ) will be used by Diplomatic Security,s
Office of Intelligence and Threat Analysis (ITA) to help
ascertain Posts, threat levels for political violence and
terrorism. ITA requests that Post complete the SEPQ by
Friday, February 27. SEPQ responses should be sent open
channel and slugged for DS/TIA/ITA, with the FBI, CIA, and
DIA as info addressees.
2. (U) General guidance for completing the questionnaires: A
formal response is required even if there are no identifiable
changes from the last rating cycle. Posts are reminded they
are ultimately responsible for ensuring SEPQs are submitted
for constituent Posts as well. Posts are encouraged to
provide substantive responses to applicable questions rather
than a simple yes or no. Thorough responses will better
support the analysis required to determine threat ratings.
Please ensure the SEPQ responses are numbered and properly
coordinated with the appropriate sections of the
questionnaire. Although this cable is unclassified, the
responses should not be limited to this classification.
3. (U) By way of background, the Bureau of Diplomatic
Security is responsible for evaluating the threat environment
for personnel and facilities that fall under Chief of Mission
authority. The official ratings for these facilities are
published semi-annually in the SETL (REF A), and the
responses to the questions posed below will facilitate the
rating process for the SETL.
4. (U) When published, the SETL is considered an evolving
document, reflective of the general threat environment as
opposed to a depiction of the fluctuating real-time threat
situation. The SETL is designed to provide a long-term
picture for planning purposes. In instances when threat
information is considered sufficiently credible to warrant an
immediate response, the dispatch of TDY security personnel
and security resources will be committed as necessary,
regardless of the assigned SETL threat level for the Post.
--------------------
Security Environment Profile Questionnaire
--------------------
--------------------
5. (U) Political Violence
--------------------
I. (U) Demonstrations
A. Are there any ethnic or religious communities in-country
prone to carrying out significant anti-American
demonstrations? If yes, please describe.
i. Have there been anti-American demonstrations in the
country within the last 12 months? If yes, please describe.
ii. Have anti-American demonstrations taken place near or in
front of U.S. diplomatic facilities? If yes, please describe.
iii. What is the average size of an anti-American
demonstration?
iv. Are anti-American demonstrations usually triggered by
U.S. foreign policy initiatives, military actions, or by
domestic issues?
B. Are demonstrations generally violent or peaceful?
i. Have violent demonstrations resulted in damage to USG
property or injuries to USG employees? If yes, please
describe.
ii. Have violent demonstrators ever penetrated our perimeter
security line? If yes, please describe.
C. Have any anti-government demonstrations taken place in the
country within the last 12 months?
i. Have any anti-government demonstrations taken place near
or in front of U.S. diplomatic facilities? If yes, please
describe.
ii. What is the average size of an anti-government
demonstration?
iii. Are demonstrations generally violent or peaceful?
iv. Have any demonstrations resulted in damage to USG
property? If yes, please describe.
II. (U) Macro Conflict Conditions
A. Is the host country engaged in an interstate or intrastate
conflict? (This may include battles between organized and
violent drug cartels.) If yes, please provide a brief
synopsis.
B. If an intrastate conflict, is it an insurgency limited to
a specific region or is it a countrywide civil war?
C. If limited to a specific region, are any U.S. diplomatic
facilities located in this region? If so, where?
D. Have any of the factions involved in intrastate conflicts
signaled or demonstrated an anti-American orientation? If
yes, please provide a brief synopsis.
III. (U) Host Country Capabilities
A. Are law enforcement agencies professional and
well-trained? Please describe.
B. Have they been trained by U.S. agencies? If so, please
elaborate on effectiveness of training.
C. Are law enforcement agencies confronted with serious,
widespread corruption inside their agencies? Please describe.
D. Are the intelligence services professional and capable of
deterring terrorist actions? Please provide examples.
E. Have the intelligence services been cooperative with U.S.
Embassy requests for information and support?
F. Assuming there have been significant terrorist threats in
recent years, have host country security services been able
to score any major anti-terrorism successes? If yes, please
describe.
G. Has host country been responsive (re: timeliness and
allocation of resources) to U.S. Embassy requests for
protective security? If no, please elaborate.
H. How does the Embassy assess the overall security at major
airports in the country? (excellent; very good; good/average;
poor) If poor, please elaborate.
I. How effective are customs and immigration controls
agencies? (effective; average; ineffective) If ineffective,
please elaborate.
J. How effective are border patrol forces? (effective;
average; ineffective) If ineffective, please elaborate.
--------------------
6. (U) Indigenous Terrorism
--------------------
I. (U) Anti-American Terrorist Groups
A. Are there indigenous, anti-American terrorist groups
in-country? If yes, how many? Please name groups.
B. Have groups carried out lethal anti-American attacks
within the last 12 months? If yes, please describe.
C. Were there any other anti-American attacks? If yes, please
describe.
D. Have groups attacked U.S. diplomatic targets? If yes,
please describe.
E. Have groups attacked U.S. business, U.S. military, or U.S.
related targets? If yes, please describe.
F. Have groups limited their attacks to specific regions or
do they operate country-wide?
G. If attacks are limited to regions, are there any U.S.
diplomatic facilities located in these regions? If so, where?
II. (U) Other Indigenous Terrorist Groups
A. Are there other indigenous terrorist groups (not
anti-American) in-country? If yes, how many? Please name
groups.
B. Have groups carried out attacks in the capital or in areas
where U.S. diplomatic facilities are located? If so, how
close?
C. Were attacks lethal and/or indiscriminate? Please
elaborate.
D. Have any Americans been killed or injured in these attacks?
--------------------
7. (U) Transnational Terrorism
--------------------
I. (U) Transnational Terrorist Indicators
A. Are there any foreign terrorist groups that have a
presence in-country? Please provide names.
B. How does Post assess this presence? Is it an operational
cell? Financial cell? Support cell? Propaganda cell?
C. Is the host government sympathetic to these groups?
D. Are there suspect non-governmental organizations (NGOs) in
the country that have a relationship with any of these groups?
E. Are there any ethnic or religious communities in-country
that are sympathetic to these groups?
F. How does Post assess the level, intent, and scope of
hostile intelligence services (Iran, Iraq, Syria, Serbia,
Sudan, etc.) .in-country relative to potential anti-American
terrorist acts?
G. How does Post assess the availability of weapons and
explosives in-country or from nearby countries for hostile
terrorist elements?
CLINTON

Raw content

UNCLAS STATE 013023
FOR RSO
E.O. 12958: N/A
TAGS: ASEC, PTER
SUBJECT: SECURITY ENVIRONMENT PROFILE QUESTIONNAIRE -
SPRING 2009
REF: 08 STATE 33533
1. (U) The following Security Environment Profile
Questionnaire (SEPQ) will be used by Diplomatic Security,s
Office of Intelligence and Threat Analysis (ITA) to help
ascertain Posts, threat levels for political violence and
terrorism. ITA requests that Post complete the SEPQ by
Friday, February 27. SEPQ responses should be sent open
channel and slugged for DS/TIA/ITA, with the FBI, CIA, and
DIA as info addressees.
2. (U) General guidance for completing the questionnaires: A
formal response is required even if there are no identifiable
changes from the last rating cycle. Posts are reminded they
are ultimately responsible for ensuring SEPQs are submitted
for constituent Posts as well. Posts are encouraged to
provide substantive responses to applicable questions rather
than a simple yes or no. Thorough responses will better
support the analysis required to determine threat ratings.
Please ensure the SEPQ responses are numbered and properly
coordinated with the appropriate sections of the
questionnaire. Although this cable is unclassified, the
responses should not be limited to this classification.
3. (U) By way of background, the Bureau of Diplomatic
Security is responsible for evaluating the threat environment
for personnel and facilities that fall under Chief of Mission
authority. The official ratings for these facilities are
published semi-annually in the SETL (REF A), and the
responses to the questions posed below will facilitate the
rating process for the SETL.
4. (U) When published, the SETL is considered an evolving
document, reflective of the general threat environment as
opposed to a depiction of the fluctuating real-time threat
situation. The SETL is designed to provide a long-term
picture for planning purposes. In instances when threat
information is considered sufficiently credible to warrant an
immediate response, the dispatch of TDY security personnel
and security resources will be committed as necessary,
regardless of the assigned SETL threat level for the Post.
--------------------
Security Environment Profile Questionnaire
--------------------
--------------------
5. (U) Political Violence
--------------------
I. (U) Demonstrations
A. Are there any ethnic or religious communities in-country
prone to carrying out significant anti-American
demonstrations? If yes, please describe.
i. Have there been anti-American demonstrations in the
country within the last 12 months? If yes, please describe.
ii. Have anti-American demonstrations taken place near or in
front of U.S. diplomatic facilities? If yes, please describe.
iii. What is the average size of an anti-American
demonstration?
iv. Are anti-American demonstrations usually triggered by
U.S. foreign policy initiatives, military actions, or by
domestic issues?
B. Are demonstrations generally violent or peaceful?
i. Have violent demonstrations resulted in damage to USG
property or injuries to USG employees? If yes, please
describe.
ii. Have violent demonstrators ever penetrated our perimeter
security line? If yes, please describe.
C. Have any anti-government demonstrations taken place in the
country within the last 12 months?
i. Have any anti-government demonstrations taken place near
or in front of U.S. diplomatic facilities? If yes, please
describe.
ii. What is the average size of an anti-government
demonstration?
iii. Are demonstrations generally violent or peaceful?
iv. Have any demonstrations resulted in damage to USG
property? If yes, please describe.
II. (U) Macro Conflict Conditions
A. Is the host country engaged in an interstate or intrastate
conflict? (This may include battles between organized and
violent drug cartels.) If yes, please provide a brief
synopsis.
B. If an intrastate conflict, is it an insurgency limited to
a specific region or is it a countrywide civil war?
C. If limited to a specific region, are any U.S. diplomatic
facilities located in this region? If so, where?
D. Have any of the factions involved in intrastate conflicts
signaled or demonstrated an anti-American orientation? If
yes, please provide a brief synopsis.
III. (U) Host Country Capabilities
A. Are law enforcement agencies professional and
well-trained? Please describe.
B. Have they been trained by U.S. agencies? If so, please
elaborate on effectiveness of training.
C. Are law enforcement agencies confronted with serious,
widespread corruption inside their agencies? Please describe.
D. Are the intelligence services professional and capable of
deterring terrorist actions? Please provide examples.
E. Have the intelligence services been cooperative with U.S.
Embassy requests for information and support?
F. Assuming there have been significant terrorist threats in
recent years, have host country security services been able
to score any major anti-terrorism successes? If yes, please
describe.
G. Has host country been responsive (re: timeliness and
allocation of resources) to U.S. Embassy requests for
protective security? If no, please elaborate.
H. How does the Embassy assess the overall security at major
airports in the country? (excellent; very good; good/average;
poor) If poor, please elaborate.
I. How effective are customs and immigration controls
agencies? (effective; average; ineffective) If ineffective,
please elaborate.
J. How effective are border patrol forces? (effective;
average; ineffective) If ineffective, please elaborate.
--------------------
6. (U) Indigenous Terrorism
--------------------
I. (U) Anti-American Terrorist Groups
A. Are there indigenous, anti-American terrorist groups
in-country? If yes, how many? Please name groups.
B. Have groups carried out lethal anti-American attacks
within the last 12 months? If yes, please describe.
C. Were there any other anti-American attacks? If yes, please
describe.
D. Have groups attacked U.S. diplomatic targets? If yes,
please describe.
E. Have groups attacked U.S. business, U.S. military, or U.S.
related targets? If yes, please describe.
F. Have groups limited their attacks to specific regions or
do they operate country-wide?
G. If attacks are limited to regions, are there any U.S.
diplomatic facilities located in these regions? If so, where?
II. (U) Other Indigenous Terrorist Groups
A. Are there other indigenous terrorist groups (not
anti-American) in-country? If yes, how many? Please name
groups.
B. Have groups carried out attacks in the capital or in areas
where U.S. diplomatic facilities are located? If so, how
close?
C. Were attacks lethal and/or indiscriminate? Please
elaborate.
D. Have any Americans been killed or injured in these attacks?
--------------------
7. (U) Transnational Terrorism
--------------------
I. (U) Transnational Terrorist Indicators
A. Are there any foreign terrorist groups that have a
presence in-country? Please provide names.
B. How does Post assess this presence? Is it an operational
cell? Financial cell? Support cell? Propaganda cell?
C. Is the host government sympathetic to these groups?
D. Are there suspect non-governmental organizations (NGOs) in
the country that have a relationship with any of these groups?
E. Are there any ethnic or religious communities in-country
that are sympathetic to these groups?
F. How does Post assess the level, intent, and scope of
hostile intelligence services (Iran, Iraq, Syria, Serbia,
Sudan, etc.) .in-country relative to potential anti-American
terrorist acts?
G. How does Post assess the availability of weapons and
explosives in-country or from nearby countries for hostile
terrorist elements?
CLINTON